{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T22:12:14Z","timestamp":1742940734814,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030727949"},{"type":"electronic","value":"9783030727956"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-72795-6_33","type":"book-chapter","created":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T21:04:32Z","timestamp":1619384672000},"page":"399-408","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Information Intelligent Acquisition Generated by Matrix Reasoning of Inverse P-Set"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5783-4415","authenticated-orcid":false,"given":"Shouwei","family":"Li","sequence":"first","affiliation":[]},{"given":"Zongjun","family":"You","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"issue":"6","key":"33_CR1","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1177\/0165551515602847","volume":"41","author":"O Ajao","year":"2015","unstructured":"Ajao, O., Hong, J., Liu, W.: A survey of location inference techniques on twitter. J. Inf. Sci. 41(6), 855\u2013864 (2015)","journal-title":"J. Inf. Sci."},{"issue":"4","key":"33_CR2","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1177\/0165551511406625","volume":"37","author":"JM Budd","year":"2011","unstructured":"Budd, J.M.: Revisiting the importance of cognition in information science. J. Inf. Sci. 37(4), 360\u2013368 (2011)","journal-title":"J. Inf. Sci."},{"issue":"20","key":"33_CR3","first-page":"735","volume":"6","author":"F Chengxian","year":"2012","unstructured":"Chengxian, F., Shunliang, H.: Inverse P-reasoning discovery identification of inverse P-information. Int. J. Digit. Content Technol. Appl. 6(20), 735\u2013744 (2012)","journal-title":"Int. J. Digit. Content Technol. Appl."},{"key":"33_CR4","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1016\/j.future.2019.04.017","volume":"100","author":"IU Din","year":"2019","unstructured":"Din, I.U., Guizani, M., Rodrigues, J.J., Hassan, S., Korotaev, V.V.: Machine learning in the Internet of Things: designed techniques for smart cities. Future Gener. Comput. Syst. 100, 826\u2013843 (2019)","journal-title":"Future Gener. Comput. Syst."},{"issue":"3","key":"33_CR5","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1177\/0165551516642688","volume":"43","author":"T Hao","year":"2017","unstructured":"Hao, T., Zhu, C., Mu, Y., Liu, G.: A user-oriented semantic annotation approach to knowledge acquisition and conversion. J. Inf. Sci. 43(3), 393\u2013411 (2017)","journal-title":"J. Inf. Sci."},{"issue":"20","key":"33_CR6","first-page":"471","volume":"7","author":"L Hongkang","year":"2012","unstructured":"Hongkang, L., Chengxian, F.: Embedding-camouflage of inverse P-information and application.Int. J. Converg. Inf. Technol 7(20), 471\u2013480 (2012)","journal-title":".Int. J. Converg. Inf. Technol"},{"issue":"8","key":"33_CR7","first-page":"97","volume":"48","author":"G Hualong","year":"2013","unstructured":"Hualong, G., Baohui, C., Jihua, T.: Inverse P-sets and intelligent fusion mining-discovery of information. J. Shandong Univ. (Nat. Sci.) 48(8), 97\u2013103, 110 (2013)","journal-title":"J. Shandong Univ. (Nat. Sci.)"},{"issue":"2","key":"33_CR8","first-page":"89","volume":"49","author":"T Jihua","year":"2014","unstructured":"Jihua, T., Bao-hui, C.: Intelligent fusion of internal inverse packet information and expansion relationship of attribute disjunction. J. Shandong Univ. (Nat. Sci.) 49(2), 89\u201392, 97 (2014)","journal-title":"J. Shandong Univ. (Nat. Sci.)"},{"issue":"10","key":"33_CR9","doi-asserted-by":"publisher","first-page":"4389","DOI":"10.1007\/s00542-018-3867-5","volume":"24","author":"T Jihua","year":"2018","unstructured":"Jihua, T., Ling, Z., Baohui, C., Kaiquan, S., HsienWei, T., Yilun, C.: Outer P-information law reasoning and its application in intelligent fusion and separating of information law. Microsyst. Technol. 24(10), 4389\u20134398 (2018)","journal-title":"Microsyst. Technol."},{"issue":"1","key":"33_CR10","first-page":"98","volume":"47","author":"S Kaiquan","year":"2012","unstructured":"Kaiquan, S.: Inverse P-sets. J. Shandong Univ. (Nat. Sci.) 47(1), 98\u2013109 (2012)","journal-title":"J. Shandong Univ. (Nat. Sci.)"},{"key":"33_CR11","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-662-45526-5_22","volume-title":"Digital Services and Information Intelligence","author":"K-Q Shi","year":"2014","unstructured":"Shi, K.-Q.: Function inverse P-sets and the hiding information generated by function inverse P-information law fusion. In: Li, H., M\u00e4ntym\u00e4ki, M., Zhang, X. (eds.) I3E 2014. IAICT, vol. 445, pp. 224\u2013237. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45526-5_22"},{"issue":"3","key":"33_CR12","first-page":"599","volume":"37","author":"S Kaiquan","year":"2015","unstructured":"Kaiquan, S., Jihua, T., Ling, Z.: Intelligent fusion of inverse packet information and recessive transmission of information\u2019s intelligent hiding. Syst. Eng. Electron. 37(3), 599\u2013605 (2015)","journal-title":"Syst. Eng. Electron."},{"key":"33_CR13","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1016\/j.ijinfomgt.2019.04.006","volume":"49","author":"D Li","year":"2019","unstructured":"Li, D., Deng, L., Lee, M., Wang, H.: IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning. Int. J. Inf. Manag. 49, 533\u2013545 (2019)","journal-title":"Int. J. Inf. Manag."},{"key":"33_CR14","unstructured":"Ling, Z., Xuefang, R., Kaiquan, S.: Inverse P-data models and data intelligent separation. In: 2016 International Conference on Electronic Information Technology and Intellectualization (ICEITI), pp. 1\u20139 (2016)"},{"key":"33_CR15","unstructured":"Ling, Z., Xuefang, R., Kaiquan, S.: Inverse P-information law models and the reality-camouflage intelligent transformations of information image. In: 2016 International Conference on Network and Information Systems for Computers (ICNISC), pp. 337\u2013341. IEEE (2016)"},{"issue":"10","key":"33_CR16","doi-asserted-by":"publisher","first-page":"4415","DOI":"10.1007\/s00542-018-3894-2","volume":"24","author":"L Zhang","year":"2018","unstructured":"Zhang, L., Ren, X., Shi, K., Tseng, H.-W., Chen, Y.-L.: Inverse packet matrix reasoning model-based the intelligent dynamic separation and acquisition of educational information. Microsyst. Technol. 24(10), 4415\u20134421 (2018). https:\/\/doi.org\/10.1007\/s00542-018-3894-2","journal-title":"Microsyst. Technol."},{"issue":"6","key":"33_CR17","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1177\/0165551512448985","volume":"38","author":"T Xu","year":"2012","unstructured":"Xu, T., Peng, Q.: Extended information inference model for unsupervised categorization of web short texts. J. Inf. Sci. 38(6), 512\u2013531 (2012)","journal-title":"J. Inf. Sci."},{"issue":"10","key":"33_CR18","first-page":"211","volume":"43","author":"R Xuefang","year":"2016","unstructured":"Xuefang, R., Ling, Z.: Boundary characteristics of inverse P-sets and system condition monitoring. Comput. Sci. 43(10), 211\u2013213, 255 (2016)","journal-title":"Comput. Sci."},{"issue":"12","key":"33_CR19","first-page":"54","volume":"51","author":"R Xuefang","year":"2016","unstructured":"Xuefang, R., Ling, Z.: Perturbation theorems of inverse P-sets and perturbation-based data mining. J. Shandong Univ. (Nat. Sci.) 51(12), 54\u201360 (2016)","journal-title":"J. Shandong Univ. (Nat. Sci.)"},{"issue":"10","key":"33_CR20","doi-asserted-by":"publisher","first-page":"4187","DOI":"10.1007\/s00542-018-3704-x","volume":"24","author":"R Xuefang","year":"2018","unstructured":"Xuefang, R., Ling, Z., Kaiquan, S., Tseng, H., YiLun, C.: Inverse P-augmented matrix method-based the dynamic findings of unknown information. Microsyst. Technol. 24(10), 4187\u20134192 (2018)","journal-title":"Microsyst. Technol."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Simulation Tools and Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-72795-6_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T21:25:42Z","timestamp":1619385942000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-72795-6_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030727949","9783030727956"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-72795-6_33","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"26 April 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SIMUtools","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Simulation Tools and Techniques","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guiyang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 August 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"simutools2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/simutools.eai-conferences.org\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"354","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"125","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to COVID 19 pandemic the conference was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}